Professional Documents
Culture Documents
The emergence of cyberspace, a virtual global domain, is increasingly impacting almost every aspect
of our lives. The domain is transforming our economy and security posture more than ever before,
creating opportunities for innovations and the means to improve general welfare of the citizens. It is
transforming many countries growth, dismantling barriers to commerce, and allowing
people across the globe to communicate, collaborate and exchange ideas.
However, behind this increasing dependence on cyberspace lies new risks that threaten
the national economy and security. Sensitive data, networks and systems that we now trust
can be compromised or impaired, in a fashion that detection or defence can be hard,
thus undermining our confidence in a connected economy.
The Federal government is not unmindful of the diversity of implications of the nations risk exposure
in cyberspace, hence we have put in place cohesive measures towards addressing national risks
effectively now and in the immediate future. Furthermore, the government has recognized that
for Nigeria and its citizens to continue to benefit from the full potential of information
and communication technology revolution, we must take the cyber-risks seriously. It is
on this premise that we are determined to confront the threats, uphold and support
the openness of the cyberspace as well as balance security with respect to privacy
and fundamental rights. If we fail to prepare now and act appropriately, we may be
faced with future challenges that will be more complex to manage.
In this context, government has developed a National Cybersecurity Strategy as cohesive national
measures towards addressing the challenges. These measures contain strategic initiatives and
programs that are aligned with the national doctrines, principles, vision, goals and objectives as
enshrined in the National Cybersecurity Policy. The strategy recognizes three key approaches to
a successful national cybersecurity engagement: public private sector partnership; stakeholders
collaborations and international cooperation.
It is in the light of the above that my office, in collaboration with other agencies of
government and key actors from the private sector are championing the urgent
need for comprehensive national cybersecurity programmes. It is my hope that the
synergy already developed between the stakeholders drawn from different
backgrounds will be sustained through all the implementation stages. My office will
continue to explore common grounds around which we can sustain this
collaboration on cybersecurity for the common good of our country.
We shall keep all channels open for close monitoring and evaluation of the
implementation of this policy, which shall be due for comprehensive review in another
five years. My office shall facilitate regular collation of feedback from stakeholders that
will enhance periodic review of the process.
M. S. DASUKI CFR.
National Security Adviser
December 2014.
TABLE OF CONTENTS
TABLE OF CONTENT.
EXECUTIVE SUMMARY...
Chapter One:
1.1. Introduction..
1.2. National Cybersecurity Vision
1.3. The Aim of National Cybersecurity Strategy....
1.4. Cyberspace Within the Context of National Prosperity & Opportunities...
1.5. Cyber-Risk within the Context of National Security & Economic Impact .....
1.6. Cybersecurity within the context of National Security Strategy..
Chapter Two:
2.1 Introduction..
2.2 Cyber-threat Landscape & Impacts.
2.3 Imperative of a National Vulnerability Assessment.
2.4 Gauging Impacts and Opportunities..
Chapter Three:
Chapter Four:
4.1 Objectives..
4.2 Approach...
4.3 Initiatives...
4.4 Special Areas of Focus .
Chapter Five:
5.1 Purpose.
5.2 Establishing National CERT..
5.3 Implementation Approach..
5.4 Preventive Strategy.
5.5 Detection Strategy...
5.6 Response Strategy..
5.7 Cooperation and Partnership.
5.8 Capacity Building.
5.9 National Digital Forensic Mechanism...
Chapter Six:
6.1 Introduction...
6.2 Vision of CIIPR.
6.3 Mission of CIIPR..
6.4 Strategic Objectives
6.5 Strategic Imperatives to Achieve Aims and Objectives
6.6 Initiative 1..
6.7 Initiative 2..
6.8 Initiative 3..
6.9 Initiative 4..
6.10 Success Criteria and Review of CIIP Strategy...
Chapter Seven:
7.1 Introduction
7.2 Strategic Objective
7.3 The Cybersecurity Assurance Context..
7.4 Focal Points
7.5 Strategy......
Chapter Eight:
8.1 Introduction...
8.2 Objectives.
8.3 Scope
8.4 Initiatives...
8.5 Roadmap for Nigeria Cybersecurity Industry......
8.6 Institutional Framework...
Chapter Nine:
9:1 Introduction....
9.2 Rationale for COAEP...
9.3 Objectives..
9.4 Strategic Approach...
9.5 Strategy .
9.6 Operational Measures..
9.7 National Security Response Measures.....
Chapter Ten:
Chapter Eleven:
11.1 Introduction...
11.2 National Internet Safety Initiative..
11.3 Objective...
11.4 Scope....
11.5 Initiative.....
11.6 Importance Of Nisi to NCCC.....
FIGURES
EXECUTIVE SUMMARY
The economy of a modern Nigeria is anchored and sustained on two major infrastructural
landscape (i.e. Physical and Digital) working together to sustain critical and non-critical
sectors of the economy in Government, Manufacturing, Dams, Defence, Chemical
Sector {Oil and Gas}, Power and Energy, Commercial Facilities, Financial Services,
Food and Agro-allied, Emergency Services Transportation Systems, Public Health and
Healthcare Sector, Water and Waste Water systems. Digital infrastructure is the
National Information Infrastructure (NII) component that permeates the physical
infrastructural landscape supporting it to function seamlessly, endlessly and
sustainably. The NII is the backbone of the nations active presence in cyberspace.
Significant disruption of its operation will undermine the confidentiality, integrity and
availability of essential national services, which will be inimical to national economy
and security.
In comparison with other industrial and commercial entities, the Internet has been with
us for a relatively short period of time. It has been responsible for the most
revolutionary and rapid changes to the way we communicate, undertake business,
perform job functions as well as boost our military strategies. We have seen the
examples in the home schooling, social media and cloud computing rising on the tails
of the Internet phenomenon.
The Internet has given the phrase global village an appropriate meaning, this is
driven home with the illustration that an individual in Nigeria can immediately set up an
online conference call and chat with group of people on the other side of the planet in
real-time. The majority of users of the Internet conduct their activities in a legitimate
and above board manner, while on the other side of the internet there are individuals,
organisations, foreign intelligence agencies and state sponsored actors that have used
the very benefits of the internet, i.e. its speed, global presence and openness, to carry
out criminal activities that can cause havoc to those that are not aware, prepared or
equipped to deal with such undertakings.
These include the following:
December 2014.
CHAPTER ONE
1.1.2 The NCSS comprises of short, medium and long term mitigation strategies
covering all national priorities, addressing the nations cyber risk exposure.
Specific key cyber threats worldwide inimical to National interest are identified.
Such as;
i. Cybercrime
ii. Cyber-terrorism
iii. Cyber conflict
iv. Cyber espionage
v. Child online abuse and exploitation.
1.1.3 These threats have significant capability to damage the integrity of the nation,
disruption of critical information infrastructure operations, undermine
government operations and national security.
1.1.4 The NCSS articulates, coordinates and guides the country in the implementation
of National Cybersecurity Policy and cohesive counter-threat measures for the
protection, security and defence of National Cyberspace.
1.1.5 The Strategy provides various initiatives for the focused areas and national
mechanisms for developing and implementing Legal & Policy Measures,
National Incident Management, Critical Information Infrastructure Protection,
Cybersecurity Assurance Framework, Manpower Development, Child Online
Abuse & Exploitation, National Internet Safety, Public Awareness, Multi-
Stakeholder Partnership and Global Cooperation on Cybersecurity.
The National Cybersecurity Policy has set out a clear purpose, direction and
outcome of the countrys engagement in cybersecurity.
1.4.1 Cyberspace offers excellent platforms and opportunities for securing and growing
the nations economy.
1.4.2 Every citizen that is connected to cyberspace through the internet is immeasurably
impacted and empowered for actions.
1.4.3 In the next few years, Nigeria will become a broadband economy where every
individual and corporate citizens will have unhindered wholesome access to the
internet.
1.4.4 Cyberspace will become the mainstream for national integration and digital
economy empowerment. It is a knowledge driven space with massive capacity to
bridge gaps in mobility, commerce, innovations, education, poverty reduction, and
economic empowerment.
1.4.5 What is the Cyberspace?
It has been established that we have the contemporary four (4) domains of land,
Sea, Air and Space, Nigeria recognizes Cyberspace as the fifth (5th) domain for
driving critical national functions such as economic development, commerce
and transactions, social interactions, medical and health, government
operations, national security and defense.
1.5.1 The nations digital economic existence relies on the effective functioning of digital
infrastructure. In Cyberspace, the country is not isolated but interconnected to other
countries and active actors within cyberspace through interdependent networks of
information infrastructures. Thus, the country is exposed to predictable and
unpredictable risks.
1.5.2 Just as we have actors with legitimate intentions so also exist other actors with
illegitimate and malicious intentions. Within the global network of networks there
are critical structural flaws which can be exploited for criminal intents and
purposes against the country to compromise the confidentiality, integrity,
availability and accessibility of the nation information systems and critical
information infrastructure.
1.5.3 Vulnerabilities exist within cyberspace that can be used to exploit national
economic interest and constitute threats to National Security. For instance, recent
compromise of some government websites, growing underground cybercrime
industry, emergence of activism through online backdoors, fraudulent practices,
incidence of online exploitation of the young segment of the population, gross
abuse of the social media for waging malicious campaign against the state, conflict
and violence perpetuated through internet, economic sabotage through distributive
denial of critical services, coordinated cyber espionage, malicious intrusion into
computer systems and other digital devices, cyber piracy and stealing of intellectual
assets, cyber-terrorism, online financial crime and money laundering, distribution of
offensive contents and child abuse materials and hosts of other malignant activities
committed through cyberspace are all inimical to the wellbeing of the country. The
economic impact is destructive to any nation.
The security inclusion of cyberspace domain will help the country prepare and
response to such security threat and help address the countrys weakness in her
own digital vulnerability, as well as strengthening our ability to provide
countermeasures in partnership with other legitimate state and non-state actors.
This is the strategic rationale for the development of National Cybersecurity Policy
and the context within which National Cybersecurity Strategy is articulated for
national security readiness.
CHAPTER TWO
UNDERSTANDING NATIONAL CYBER-RISK EXPOSURE
2.1 Introduction
In line with the national doctrine on cyber-risk exposure as reflected in the
National Cybersecurity Policy document, the country presence in cyberspace
exposes it to a new dimension of risk. Therefore, development of the countrys
Cybersecurity Strategy is approached from examining security risk exposure of
the whole country.
What Is Cyber-risk?
Cyber risk is the possibility that a threat and vulnerability exists within the
nations cyberspace inimical to the security and safety of information systems
and associated infrastructures. Furthermore, it is the possibility that the threat
will exploit a vulnerability to breach the safety and security of an information
system and or information networks or infrastructure.
i. Cyber-threat
ii. Vulnerability
2.2.1 Cyber threat is the possibility of a malicious attempt to damage or disrupt the
operations of a vulnerable computer network and information system.
2.2.2 The nature and the dimension of the impact of cyber-threat are diverse and it
involves a threat actor who performs a pre-mediated attack or exploit
circumstances of an accident. A threat actor is engaged by a threat source
either clandestinely or tactically. A threat source initiates a desire to breach
access to critical information or security controls with the purpose of benefiting
from the breach, for example for financial gain or competitive advantage in the
case of industry cyber espionage.
Sources of Cyber-threat
Terrorists
&
Extremist
Group
Organized
Criminal
Hackctivists
Syndicates
NCSS Fig. 1
2.2.3 Cyber threat is escalated to cyber-attack by a threat actor where a
deliberate effort is initiated to exploit the vulnerability of computer systems,
information and communication networks, and internet driven processes for
criminal intent and malicious purpose.
2.2.4 It usually involves the use of malicious codes to alter digital codes, logic or
data, resulting in disruptive consequences that can compromise the
confidentiality, integrity, and availability of data and lead to manipulation of
information systems and internetwork infrastructure.
2.2.5 Cyber-attacks may lead to the following consequences: Identity theft, fraud,
extortion, Malware, pharming, phishing, spamming, spoofing, spyware,
Trojans and viruses, manipulation of hardware, denial-of-service and
distributed denial-of-service attacks, breach of access, password sniffing,
system infiltration, website defacement, private and public web browser
exploits, instant messaging and social media abuse, and intellectual property
theft.
1
Nigerian financial consumer loss to Cybercrime in 2010 stood at
N2,146,666,345,014.75 ($13,547,910,034.80) to cybercrime in 20122
2.2.7 Cyber threat landscape is diverse and diffusely driven by state and non-state
actors.
State Actor:
The State Actors are established and well organised to carry out the most
sophisticated threat in the cyberspace with the goal of exploiting computers
and information and communication networks to gather intelligence on
government, military, industrial and economic targets, and opponents of their
Regimes. They gathered intelligence data and information which can be used
for spreading falsehood and disrupting critical services. Sometimes they
install hidden malicious software on a system can be adapted to suit an
attackers changing objectives, lying hidden within the system in readiness for
exploitation during times of increased tension or conflict.
2
Economic
Cost
of
Cyber
Crime
in
Nigeria
by
Gbenga
Sesan,
Babatope
Soremi
and
Bankole
Oluwafemi
as
part
of
the
output
for
the
Cyber
Stewards
Network
Project
of
The
Citizen
Lab,
Munik
School
of
Global
Affairs.
University
of
Toronto
and
Supported
by
international
development
research
centre.(IDRC)
Activist with unwholesome pattern of obtaining information used against
established authorities. They operate through social media and vulnerable
backdoors, usually connecting with an insider with passive attack tendency.
2.2.8 The National Cybersecurity Policy document has identified and classified five
(5) major cyber threats as inimical to the national security strategy. These
threats have significant capability to cause considerable damage to the
integrity of the countrys economy.
2.3.3 The national vulnerability assessment helps the government appreciate the
level of her unpreparedness, the need to safeguard huge investments in
information systems and communication infrastructure and commitment made
to global partners National ICT developmental goals.
2.3.4 There are efforts aimed at addressing some of these challenges at the
sectorial levels. However, NCSS is laying a foundation for the coordination of
the country cyber-ecosystem with a unified framework on cybersecurity.
2.3.5 The ultimate goal is to build a collective counter-measures mechanisms that
will facilitate the countrys capability in addressing the huge vulnerability gaps
among the states information systems, critical information infrastructure, and
protection of our presence in cyberspace.
2.4.3 National enterprise security architecture is further enhanced with the inclusion
of cybersecurity strategy. A new and holistic National Security Architecture will
emerge by integrating physical and cyber security as countermeasures
against external threat, thus consolidate the country readiness capability.
Nigerias readiness to defend her citizens, safeguarding operations of
critical information infrastructures and extra-territorial jurisdiction in time of
unpredictable cyber-attack, ensures continuity of critical operations amidst
adversaries.
CHAPTER THREE
3.1.5 The paramount focus of the cybersecurity strategy is addressing our cyber risk
exposure, protection of our national critical information infrastructure,
exploiting cyberspace opportunities for national security and economic goals,
and the enthronement of a trusted cyber community remain a paramount
focus of the National Cybersecurity Strategy.
3.2.1 The multi-dimensional nature of the evolving security threats is moving the
current National Security Strategy beyond the traditional scope.
3.2.2 The nature of the current security threats such as cybercrime, violence,
conflict and terrorism increasingly exploits the openness and borderless
nature of cyberspace. This constitutes a threat to our growing dependence on
cyberspace.
3.3.1 The Strategy aims are to set out a national roadmap with various coordinated
mechanisms; harness implementation framework; and actions that will
guarantee attainment of the National vision, mission and goals on
Cybersecurity as captured in the National Cybersecurity Policy.
3.3.2 Therefore, the Strategy is needed to achieve the following specific objectives:
v. A trusted mechanism for engaging national multi-stakeholder and
international partners towards collectively addressing cyber threats.
vi. To deter and protect government from all forms of cyber-attacks.
3.3.2 The Strategy is further aligned with National Security Strategy and other
relevant government documents most especially National ICT policy and
National broadband plan.
3.3.3 The Strategy defines the basis for a coordinated national and globally
compatible framework for action, cooperation and approach to protecting
national critical information infrastructure against cyber threats.
The scope of the national cybersecurity strategy covers the areas of national
priorities as well as general framework for partnership and international multi-
stakeholder cooperation on cybersecurity.
3.6.2 The central coordination model will operate in synergy with federated
structures toward achieving comprehensive measures on cybersecurity.
3.6.3 Central coordination model is adopted in line with international best practices
and has recommended in the global framework for cooperation on
cybersecurity
3.6.4 The sustainability and critical success factor of this governance model is
anchored on public-private sector partnership, multi-stakeholder engagement
as well as regional and international cooperation.
CHAPTER FOUR
4.1 Objective
4.1.1 The objective of the Cyber Security Legal Framework is to identify the
strategy required to ensure areas defined in the Cyber security Policy are
implemented, managed, sustained and effective in combating cybercrime in
Nigeria.
4.1.2 To achieve this aim, a number of immediate and long term legal framework
initiatives will need to be developed, agreed, funded and rolled out to
accomplish success.
4.2 Approach
The approach takes the form of referencing aspects of the Legal Framework
in the cyber security policy with a view to prescribing the initiatives that will
allow for the implementation of each of the detailed areas.
Cyber
CrimeLegal
Framework
Judicial
Review
International Cooperation
Raising Awareness
4.3 Initiatives:
As prescribed in the cyber security policy, fit for purpose legislation will need
to be enacted and implemented to combat cybercrime.
The main focus of this initiative will entail a root and branch review of Nigerias
current and draft cybercrime legislations.
The objective of this exercise will be to identify any gaps between what is
currently available and what has been proposed in the Cyber security policy
with a view to updating any omissions or redundancies so that when the
legislation is enacted , it will be adequately effective , workable and flexible
enough to deter and prosecute cybercrime activities
The strategy to achieve this will include the establishment of a Cyber Crime
Legislative Review Committee (CCLRC) whose purview will be to advise the
National Security Advisor, Legislature and regulatory bodies on aspects of
legislations that needs to be amended to ensure current legislations do not
become redundant, unenforceable and ineffective.
This is an immediate initiative and needs to be given special priority as it
forms the bedrock of the applicability, enforceability and prosecution of
individuals and organisations that breach key segments of the National Cyber
Security policy.
4.3.2 Initiative 2.
a) Capacity building for Judges and lawyers on the new cybercrime laws
b) Courts will be equipped to handle digital forensic evidence
c) Provide law enforcement agencies with the processes and procedures for
investigating cybercrime activities.
d) Capacity building for law enforcement and security agencies on digital
forensic capability.
This will be achieved by developing a home grown fit for purpose certified
programme of training courses, capacity building, awareness programmes
and materials for current Nigerian judges and lawyers.
The strategy will also include the incision of new cybercrime legislation
courses in institutes of higher learning so that newly qualified lawyers have a
basic understanding of Nigerias cybercrime framework.
This will allow for the following:
It is envisaged that the processes to engage with international bodies will start
to be defined with the objective of implementing and achieving within the next
12 months.
Recognizing that cybercrime can impact both private and public sector
environments, the legal strategy is to adopt processes for both public and
private sector collaboration in combating cybercrime.
This will also extend to financial institutions in ensuring they retain customer
records according to specified time lines.
The strategy will also entail providing specific guidelines on how to meet these
requirements.
A key part of the public/private sector collaborative strategy will be to put in
place measures to reduce reliance on foreign controlled networks to store
personal information of Nigeria Citizens.
This will have the impact of reducing the risk footprint as well as the potential
for such data to be compromised and used to the detriment of Nigerians
It is also part of the strategy to socialise these new laws to the wider
international community.
The revelations also identified the need to protect and secure communications
of not only high ranking government and high profile individuals from mobile
phone tapping but also ordinary individuals from their everyday non-criminal
conversations being intercepted and analysed by law enforcement agencies,
organisations and foreign countries.
To protect and legislate for criminal activities against Nigerian Citizens data
and their communications special emphasis will be given to the development
and roll out of Data Protection and Privacy laws in Nigeria.
It will also allow them to be aware of what constitutes unacceptable and illegal
behaviour in relation to the use of such information and communication
streams.
The legislative, technical and policy initiatives to fulfil this aim will consist of
the following:
i. Developing and enacting fit for purpose Data Protection and Privacy
laws.
viii. Identifying where Nigerian Citizens Data details are held and if systems
held on are appropriately protected
xii. Liaison with both private and public sector commercial organisations to
help them understand the measures they need to take to reduce their
risks to data protection and privacy breaches
xiii. Liaising with NCC , NITDA, Central Bank , Judiciary and Military to
drive data protection in Telecoms, Finance and, government
institutions and Judiciary
CHAPTER FIVE
5.1.2 The strategy will also facilitate, promote and strengthen national commitments
to regional and global partnerships and cooperation on cybersecurity.
5.2.4 However, where existing laws are inadequate, a review or new legislative
processes should commence to address legal vacuum that will hinder
operations of the national CERT.
5.2.5 The harmonized laws should clearly mandate it to function as of one the
strategic components of the central coordinating center for all computer
security incident management within our national cyberspace. Additionally,
incident classification will be the sole role of the Cyber Emergency Monitoring
System (CEMS) administered and managed by ngCERT.
5.2.6 Additionally, incident classification will be the sole role of the Cyber
Emergency Monitoring System (CEMS) administered and managed by
ngCERT.
5.3.2 The plan will set out clear definitions and procedures for incident response
that will focus on incident classification and its severance.
5.3.3 In addition, incident classification will be the sole role of the Cyber Emergency
Monitoring System (CEMS) administered and managed by ngCERT.
5.3.4 CEMS will classify threats that constitute a national-level cyber incident
requiring ngCERT involvement and the triggering of incident response
protocols.
5.4.1 All key national information infrastructures shall have a preventive mechanism
for network monitoring system integrated into CEMS.
5.4.2 The preventive strategy will primarily be implemented by CEMS for analysis
and detection as well as alert notification.
5.4.3 CEMS operational procedure will define the baseline security monitoring for
broad detection of malicious or anomalous network activity within our
cyberspace and specify specialized security monitoring for critical assets and
critical processes within the context of the National Critical Information
Infrastructure Protection Plan (NCIIPP).
5.5.1 The Cyber Emergency Monitoring System (CEMS) will serve as the main
provider of data analysis and reporting to other key detection and response
partners across the incident management ecosystem.
5.5.2 Its key focus is to consistently monitor indicators within the nations cyber
space in order to detect potential threats and classify them according to its
severance level determined. This can serve as an alert to the trigger the next
chain of activity in the response protocols.
5.6.1 After an incident is detected and validated by the CEMS, direct and
coordinated action will be implemented immediately to ensure that appropriate
actions to stop an on-going incident occur at the right time on the right
cybersecurity priorities.
5.6.2 The action plan will require identifying the scope and scale of the incident in
order to activate the relevant countermeasures procedures as outlined in
NIRP to mitigate damages.
established chain of custody.
5.7.4 NgCERT also will enable both government and private sector actors through
stimulated exercises to support stakeholders understand their roles during a
crisis and better prepare for incident response scenarios. This will test
incident response capabilities and processes created to communicate,
collaborate, and restore services in the event of an incident.
5.8 Capacity Building
5.8.3 Training will focus on methods of handling digital evidence to ensure that it
preserves its evidential weight and thus admissibility in Court.
CHAPTER SIX
6.1 Introduction
6.1.1 This Strategy articulates the various Critical Information Infrastructure (CII)
protection and resilience activities the Government undertakes, ranging from
how it engages with business, government (international and domestic) as
well as other stakeholders.
6.3 Mission of CIIPR
vi. Based on the vision, mission, and goals, the critical infrastructure
community will work together to set specific national priorities. National
priorities will be set considering resource availability, progress already
made, known capability gaps, and emerging trends and risks in
cybersecurity.
vii. National priorities will drive implementation and will be supplemented
by sector, regional, and corporate priorities. Performance measures will
be set based on the goals and priorities of each sector, regional or
national Government.
6.6.1 Necessity for Trust Information Sharing Network (TISN) Activity for
NCIIPP
There will be need for the establishment of a TISN for National Critical
Information Infrastructure Protection Plan (NCIIPP).
6.6.2 Trusted Information Sharing Network Initiative (TISN)
The TISN will be established in the Office of the National Security Adviser
as an exclusive forum in which the owners and operators of critical
infrastructure work come together and share information on threats and
vulnerabilities as well as develop strategies and solutions to mitigate risk
to the nations CII.
Sector Groups form the bridge between government and the individual
owners and operators of Nigerias critical infrastructure.
There will be sector specific plans for each sector which will highlight
sector level performance objectives and feedback to the coordinating
agency of government charged with the responsibility of managing the
sector.
For example, the sector specific plan for the Information Technology
Sector will be coordinated and managed by the Ministry of Information and
Communication Technology. In collaboration with other stakeholders
(public and private sector partners), this Ministry will develop and
implement a Sector-Specific Plan (SSP) to enable assessment of national,
cross sector critical infrastructure protection and resilience plan. (Please
see appendices pages for a sample approach to implementing sector
specific plan and program).
Public Health and Healthcare Sector Water & Waste Water systems
6.7.1 Identification
operators of critical infrastructure to ensure an on-going identification of
critical information infrastructure.
6.7.2 Evaluation
Strategic readiness will enable owners and operators identify
vulnerabilities and interdependencies as well as plan redundancy
programmes including risks from acts of terrorism.
Prevention and Early Goal: Ensure CII are less vulnerable to disruptions and
Warning Strategy impairment duration is short and limited in proportion.
Crisis Management Goal: Alert key actors of CII of the interdependencies and
Strategy minimizing effects of disruptions on society.
Approach: Using TSIN and ngCERT frameworks, constant
rehearsals and practice of defined crisis management
strategies
NCSS
Figure
5:
Four
Pillars
of
Critical
Infrastructure
Protection
[adapted
from
ITUs
A
Generic
National
Framework
for
Critical
Information
Infrastructure
Protection
(CIIP)]
A cross-sectorial analysis of dependencies will assist owners and operators of
critical infrastructure and the Nigerian Government to understand system-wide
risks that are beyond the purview of individual organizations or sectors.
This increases the potential for a more effective sharing of risk to cope with
certain incidents. The Critical Infrastructure Program for Modelling and
Analysis (CIPMA) is proposed as a key initiative of the Nigerian Governments
efforts to enhance the protection and resilience of critical infrastructure in
Nigeria.
6.9.1 The Critical Infrastructure Program for Modelling and Analysis (CIPMA)
CIPMA also helps government shape policies on national security and critical
infrastructure resilience.
Importantly, CIPMA can show the relationships and dependencies between
critical infrastructure systems, and the cascade impacts from a failure in one
sector on the operations of critical infrastructure in other sectors.
NCIPP unit manages CIPMA and works with ONSA-NCCC and other
technical service providers to further develop and deliver this whole-of-
government capability.
Periodic lessons from incident report and reaction exercise activities and
real life events propagated to all Sector Groups to enhance organizations
Understanding of protection and resilience and improve planning
arrangements.
Chapter Seven
7.1 Introduction
7.1.1 There is a need to address the issues of cyber threats from risks management
and process governance approaches because of the need to address the
nation's internal vulnerability and other weakest link.
7.1.3 The continuous monitoring and review (i.e. assessment and evaluation) of the
implementation and management of the National Cybersecurity Program, and
the surrounding context that it operates within, will be critical in providing
assurance to various stakeholders that the National Cybersecurity program is
well able, and continually so, to safeguard our vulnerability and other critical
national infrastructure.
i. This strategy seeks to establish and maintain a monitoring and an
assurance framework that will ensure that the efforts put in place to secure
the nations cyberspace are in compliance with international best practices,
perform as expected by the stakeholders involved, as well as to maintain
the capabilities necessary to protect our nation's cyberspace and other
critical infrastructure.
An effective and efficient National Cybersecurity Assurance
Program will require clear direction, commitment from the highest
level of Government, top management and administration executive
among others.
The level to which all citizens of the country become aware of, and
educated about cybersecurity issues will to a large extent determine
how strong the cybersecurity efforts of the nation will be. As security is
only as strong as its weakest link. Initiatives to continually create
awareness among the citizens will be established and continually
reviewed for effectiveness.
National
Cybersecurity
Strategy
National
Cybersecurity
Program
Cooperation
and
Information
sharing
Cybersecurity
Stakeholders'
Commitment
Assurance
Risk
Management
program
(Assessment
and
Monitoring)
Regulatory/Legal
environment
Cybersecurity
awareness
level
NCSS
Figure
6
The
Cybersecurity
Assurance
context
-
It
shows
the
logical
environment
within
which
the
Cybersecurity
Assurance
mechanism
will
operate
and
monitor.
7.4.1 Monitor the implementation program for the Cyber Security Strategy to
provide assurance that the program is meeting, and will continue to meet
stakeholder's expectations within a dynamic cyber landscape.
7.4.3 Encourage, monitor and review the adoption of national and international best
practices as codified in the international frameworks and standards to ensure
national cybersecurity practices that compare well with international standards
and practices and also serve as a basis for benchmarking our maturity level.
7.4.4 Monitor and review cybersecurity capabilities of actors at the national, state
and sectorial levels to ensure continuous improvement and development of
relevant capabilities, skills and proficiencies, enabling them to defend our
nation in the face of present and future threats to the nations cyberspace.
7.4.5 Monitor and review level of preparedness and capacity of various actors at the
national, state and sectorial levels to ensure their readiness to defend our
nation in the face of present and future threats to the nations cyberspace.
7. 4.7 To develop performance measures both at the policy, strategic, tactical and
operational levels based on the proposed Cybersecurity balanced scorecard
and perform reviews based on these measures to ensure feedback on
performance of the National Cybersecurity program so that adequate
corrective and improvement changes can be made.
7.4.8 Conducting information security audits and process audits for government
entities and also coordinating and validating security audits and process
audits of self- assessment entities.
7.5 Strategy
7.5.1 Initiative 1
The department will be charged with the responsibilities of providing
assurance as regards the National Cybersecurity program.
7.5.2 Initiative 2
7.5.3. Initiative 3
identify alterations and weaknesses in security configurations on critical
national infrastructure.
7.5.4 Initiative 4
This strategy will implement a core assurance capability thus enabling the
nation to assess the effectiveness and adequacy of cybersecurity controls,
when evaluated from an attackers perspective, to deny the compromise of
critical nation infrastructure.
7.5.6. Initiative 6
Develop Blue team and Red team capabilities among cybersecurity actors.
CHAPTER EIGHT
NATIONAL CYBERSECURITY SKILL &
MANPOWER DEVELOPMENT
8.1 Introduction:
8.2 Objectives:
towards promoting common understanding on cybersecurity
challenge.
8.3 Scope
8.3.1 The scope of the national cybersecurity skills development include the
following;
8.3.2 Therefore, this section focuses on the framework for the creation of
programmes to increase the cadre of cybersecurity professionals in
Managerial, Technical and Information Assurance areas rather than
general user awareness and education. It further advocate for re-
organization of the nations educational priorities to address cybersecurity
challenges and opportunities.
8.4 Initiatives
the responsibility of securing and maintaining the nation's presence in
cyberspace, who will essentially be Nigerian citizens.
8.5
Roadmap
for
Nigeria
Cybersecurity
Industry:
8.5.1
In
Nigeria,
cybersecurity
essential
skills
at
the
public
institutions
and
industry
level
engagement
are
scarce.
The
scarcely
available
ones
are
extremely
limited
in
their
scope
and
capabilities
to
safeguard
and
protect
critical
industries.
Various
genuine
concerns
have
been
expressed
on
the
apparently
incapacity
of
Nigeria
as
a
nation
to
protect
itself
and
her
industry
in
the
face
of
a
major
attacks
on
her
Critical
Information
and
Related
Infrastructures.
8.5.2
Stakeholders
from
Industries,
law
enforcement
agencies,
academics,
non-
governmental
organizations,
government
Ministries,
Department
and
Agencies,
Nigeria
Professionals
in
diasporas
should
emerge
together
under
a
proposed
framework
for
cybersecurity
profession
umbrella
body
to
help
the
country
drive
common
professional
synergy
on
cybersecurity
instrument
of
research
and
development,
innovations,
and
trusted
cooperation
necessary
for
a
national
cohesion
on
cybersecurity.
8.5.3
The
proposed
government
and
private
sector
synergy
should
culminate
into
the
formation
of
Nigeria
Institution
of
Cybersecurity
(NIOC)
that
will
help
develop
and
drive
a
coherent
body
of
useful
and
applicable
knowledge
in
cybersecurity.
8.5.4
The
NIOC
will
be
expected
to
be
built
on
nationwide
standards
with
the
aim
of
harmonizing,
developing,
promoting
and
enhancing
multidisciplinary
professional
skills
capacity
and
standards
in
the
development
of
Cybersecurity
industry,
while
providing
opportunity
for
the
citizen
positive
engagement
in
cyberspace.
8.5.5
It
is
expected
that
by
promoting
national
dignity,
preserving
national
security
and
economic
values,
including
international
standards
on
multidisciplinary
professionalism
and
expertise,
the
institution
will
serve
the
human
resources
needs
of
the
country
in
both
the
government
and
private
sectors
covering
all
aspect
of
cybersecurity
as
defined
through
the
international
framework
of
cooperation
on
cybersecurity
and
other
widely
recognized
international
best
practices.
Source:
Recommendation
from
1st
National
Conference
on
Cybercrime
&
Cybersecurity
2008
An
event
organised
by
Global
Network
for
Cybersolution
in
collaboration
with
NITDA,
NCC,
Ministry
of
Justice
8.6.1 Under the NCCC, NIOC will provide strategic framework for partnership with
the following stakeholder on cybersecurity skill development, creativity,
innovation and research: academia, research & development agencies,
industry, and multi-stakeholder civil society.
8.6.2 The NIOC will develop professional career standard, minimum entry
requirement, based on categorizations acceptable to the government and
local industry.
8.6.4 NIOC will develop professional syllabus standardizations, and prospectus for
short term and career focused professional skills development.
8.6.5 NIOC will prepare, coordinate, regulate and conduct NIOC professional
examinations in different categories of certification nationwide in collaboration
with the industry.
8.6.6 The NIOC will regulate, approve and coordinate the lists of independent and
accredited cybersecurity training centres in the country.
8.6.7 NIOC will provide professional guidelines in learning resources, materials and
curriculum development that best meet local and international requirement.
8.6.8 NIOC will provide professional measurable benefits in line with national and
international best practices to all professional members scalable to fit into
various categories of membership.
Finances and relevant to the field of cybersecurity specialization, research
and development.
8.6.11 NIOC will develop industry acceptable conversion programs for young Nigeria
graduates in any recognized and approved discipline or, and equivalent in line
with the NIOC approved levels of certifications and categorization of
membership.
8.6.14 NIOC will secure international best practices approval and relevant
international standards from global institutions.
8.6.15 NIOC will provide framework for continuous professional development in line
with international best practices.
8.6.16 NIOC will interface and collaborate with relevant and other related
professional bodies for technical cooperation and partnership on technical
exchange programs relevant to cybersecurity.
8.6.17 The NIOC professional training and skills development will be based and
focused on generic cybersecurity technology and tested models as adopted
globally.
CHAPTER NINE
Cyberspace has brought huge benefits to children around the world, with the
number of connected households increasing each year. While the potential for
good is undisputed, Internet has become increasingly accessible to the critical
segment of our population i.e. Nigerian children and young people, both at
home and in schools.
Rather than surfing the Internet passively, children and young people
participate in a dynamic online environment that allows them to generate,
manipulate and consume internet content like never before, forging their place
and identity in online communities.
However, the Internet has also raised new and disturbing issues of
vulnerability, especially for children. It exposes children to potentially
negative contents.
Children and Young Persons are the most active participants in online social
networking and therefore are potential victims of improperly disseminated
and dysfunctional contents that could cause disorientation and threaten
their survival and that of the society.
There are growing concerns on the distribution of online child abuse materials
targeted to children which are making them vulnerable to child pornography,
sexual abuse, harassment, exploitation, extremism, brain washing for terrorist
acts of violence and human trafficking resulting into unpleasant outcome of
the information age.
In order to address these issues of child online exploitation and its disastrous
consequences, the National Cybersecurity Policy viewed it as one of the
critical areas of focus.
9.2.2 The Principles on Child Online Abuse & Exploitation and Counter-measures
emphasized Social Media as a vital attractive channel and tool for social
interactions and productive engagements. Regrettably, the openness and
transparent nature of cyberspace have been exploited for good causes and
malicious intents.
ii. There is a need to establish that any act against a child which is illegal
in the real world is illegal online and that online data protection and
privacy rules for legal minor are also adequate.
9.3 Objectives
9.3.2 To provide robust security initiatives, action plan, and roadmap that will give
overall direction to the planning and implementation of these
countermeasures strategy within the framework of National Security.
9.3.3 The strategy addresses urgent security and law enforcement challenges,
roles and shared responsibilities and government interventions.
9.3.4 The strategy harnesses frameworks that provide coherent structure for
coordination of multi stakeholder engagement.
9.5 Strategy
iii. The COAEP unit of NCCC will collaborate with industry regulators and
operators to implement a coherent Countermeasures Technical
Mechanisms (CTM) to prevent access to web sites identified as hosting
contents that are offensive to children and to implement processes to enable
the removal of any child sexual abuse content posted on their own services.
iv. The Unit will provide partnership mechanism in regard to the promotion of
public awareness, messages and campaigns center on safety and security of
Nigeria children interactions online.
v. The unit will train and build the capacity of Nigerian Law enforcement officers
to conduct investigations into Internet related crimes against children and
young people and maintain a register of convicted online crime offenders.
vi. The unit will facilitate national processes which ensure that all Child Abuse
and Exploitation materials found in cyberspace are channeled towards a
centralized, national resource.
i. The NCCC will drive Virtual National Taskforce (VNT) which will work with
Virtual Global Taskforce, a law enforcement body which provides a 24/7
mechanism to receive reports about illegal behavior or content from persons
across the globe. The nation will develop modality for working with this global
security platform most especially for countermeasures against terrorist
recruitment and online predators.3
iii. Investing in training for law enforcement, prosecutorial and building capacity
of Nigerian Judges through collaboration with National Judiciary Institutes.
Investment will also be needed in acquiring and maintaining the facilities
necessary to obtain and interpret forensics evidence from digital devices on
Child Abuse Materials.
3
www.virtualglobaltaskforce.com
9.6.1 NCCC will ensure that a working mechanism is established and is widely
promoted to provide a readily understood means for reporting illegal content
found on the Internet, for example, a national hotline which has the capacity to
respond rapidly and have illegal material removed or rendered inaccessible.
9.6.2 NCCC will ensure various security and law enforcement agencies in the
country implement abuse report mechanisms which will be prominently
displayed on relevant parts of any web site that allows user generated content
to appear. It should also be possible for people who feel threatened in any
way, or for people who have witnessed any worrying activity on the Internet,
to be able to report it as quickly as possible to the relevant law enforcement
agencies that need to be trained and ready to respond.
9.6.3 NCCC will promote a number of software programmes which can help screen
out unwanted material or block unwanted contacts. Utilizing some of the child
safety and filtering programmes because they are part of a computers
operating system or they are provided as part of a package available from an
ISP or ESP. The manufacturers of some game consoles also provide similar
tools if the device is Internet enabled. These programmes are not foolproof
but they can provide a welcome level of support, particularly in families with
younger children. These technical tools will be used as part of a broader
arsenal. Parental and/or guardian involvement is critical.
9.6.6 NCCC will establish a clear mechanism to enable children and young people,
or any member of the public, to report any incidents or concerns they might
have about a childs or a young persons online safety.
9.7.1 With escalation of cybercrime, youths based conflict and terrorist recruitment,
bombing attack in the country, the Internet has made possible a range of
ways of abusing children and recruiting young people, e.g., through web
cams, chat rooms and internet blog.
9.7.2 The internet has also played a singular role in expanding the scale on which
Child Abuse Material (CAM) has become available in all parts of the world.
For these reasons, when addressing online safety concerns for children and
young people from national security perspective, the Strategy gives special
consideration to the following:
ii. Taking additional response steps to disrupt or reduce the traffic in CAM,
for example by establishing a national hotline and by deploying measures
which will block access to web sites and Usenet Newsgroups known to
contain or advertise the availability of CAM.
iii. Ensuring that national processes are in place which ensure that all CAM
found in a country is channeled towards a centralized, national resource.
iv. Developing strategies to address the demand for CAM particularly among
those who have convictions for such offences. It is important to build
awareness of the fact that this is not a victimless crime: children are
abused to produce the material being viewed and by intentionally viewing
or downloading CAM one is contributing directly to the abuse of the child
depicted and one is also encouraging the abuse of more children to
produce more pictures.
v. Building awareness of the fact that Nigerian children usually would not
consent to being sexually abused, whether for the production of CAM or in
any other way. Encourage people who use CAM to seek help, while at the
same time, making them aware that they will be held criminally responsible
for the illegal activity in which they engaged/are engaging.
vii. NCCC maintains a register of convicted online crime offenders. Courts
have issued judicial orders banning such offenders from using the Internet
altogether or from using parts of the Internet which are frequented by
children and young people. The problem with these orders hitherto has
been its enforcement.
viii. Consideration will be given to integrating the list of convicted sex offenders
into a block list which will prevent those on it from visiting or joining certain
web sites.
ix. Providing appropriate long term support for victims. Where children or
young people have been victimized online, where for example an illegal
image of them has appeared on the Internet, they will naturally feel very
concerned about who might have seen it and what impact this will have on
them. It could leave the child or young person feeling vulnerable to bullying
or to further sexual exploitation and abuse.
CHAPTER TEN
10. 1 Introduction
In the light of the above, this section seeks to provide the government with a
strategic public-partnership management framework approach for the
implementation of National Cybersecurity Strategy.
ii. The Nature of the PPP Framework Model, Benefit, Impact & Direction.
iii. Special Purpose Vehicle and Delivery channel through the setting up of
PPP for Cyber security (3PC).
vi. Evaluation & Appraisal
The public and private sectors interests are enormously intertwined with a
shared responsibility for ensuring a secure cyberspace and a protected
critical economic infrastructure upon which businesses and government
services depend.
The private sector, however, designs, invest, builds, owns, operates and
maintains most of the critical information infrastructures that support
government and private users alike.
security and reliability of the infrastructure and the transactions that take
place on it and should work closely together to address these
interdependencies.
It is, therefore, critically important that government and private sector work
together in a proactive way. Successful government-private sector
collaboration requires three important component:
iii. Trust:
balance intrinsic business interest and National Interest.
10.3.1 The nature of the proposed PPMF Model involves the following:
Fig 7 The proposed linear build-up process coordination through Special Purpose
Vehicle (SPV)
ONSA-Led
Govt
Reps
SPV
Components
Muilt-
Private
International
Sectors
Reps
Reps
The ONSA through the NCCC will take the lead by establishing PPP- National
Technical Working Group (NTWG) composing of representatives from private
sector, government organizations and representatives of international
multistakeholder partners.
10.3.4 Implementation Vehicle for the Public-Private Partnership Management
Framework
iii. A selection criteria for the appointment of the Members of NTWG is based
on the value Impact of their respective inputs, in terms of the following;
Technical contributions
Critical Infrastructural Operators
National Platform & Backbone
Organizational Support: Structure & Coordination
Media
Non-government Organization
Multi-stakeholder Management
Understanding of Regional and Global framework for cooperation
Legal Issues
Public interest
framework of National Cybersecurity Strategy, thus, PPPMF will assist
government to address structural weaknesses.
vii. PPPMF will facilitate structural coordination across the public and
private sector, building public confidence in National Cybersecurity
Strategy.
CHAPTER ELEVEN
Strategy on National Internet Safety
11.1 Introduction
The initiative fits into the framework of National Cybersecurity Policy, National
Security Strategy and National ICT policy.
During the Nigeria Internet Governance Forum (NIGF 2013), it was estimated
that over 95% of Nigerian on the internet are ignorant of personal security and
safety responsibility online.
The weakest link within a cybersecurity chain of any country is her people.
Therefore, this Strategy provides initiatives and measures that help safeguard
general public internet users, provide materials and facilitate tools to help
safeguard Nigerian citizens against cyber threats and unwholesome
vulnerability.
The Strategy is focusing on the development and implementation of National
Internet Safety Initiative (NISI) under the structural framework and
coordination of NCCC.
11.3 Objective
The overall objective is to facilitate a unifying Nigeria Internet security
literacy programs, open ended, with workable guidelines, and with
implementation strategy that will engage Nigerians online and
safeguard Nigerian public Internet users.
11.4 Scope:
The initiative scope is focused on Nigerian public internet users
covering the following areas which can hamper National Security,
economy growth and local innovations.
viii. Local peculiarity & literacy gap
11.5 Initiative
iv. Setting up NISI hub under NCCC with capability for collaborating Network
through which stakeholders can plug-in and interface with tools, materials
programs, initiatives within the country.
vii. Building an indigenous capability for local internet presence, security and
safety research and development.
x. Establish response mechanism and measures for public alert system
Today, more than ever, government sees a real urgency to get the message
out to the community about the emerging threats and abuses of the citizens
on the internet. It is within the purview of ONSA through the National
Cybersecurity Strategy to provide guidance towards the development of
home-grown innovative ideas, tools and materials that will help facilitate
internet safety consciousness and online security learning aids to the citizens.
The initiative helps reawaken the nation to its statutory role within the
framework of National Cybersecurity Policy towards safeguarding Nigerian
Online Presence, developing and implementing local strategies, guidelines
and mobilization of all stakeholders to achieve this cause through enterprise
and unified platform of National Cybersecurity Coordinating Center.